General

  • Target

    Server.exe

  • Size

    93KB

  • MD5

    fd77d0eddb26050e6d00d91d22fd086f

  • SHA1

    d76544f8da71c5bee97fa646334fecd3f37c5d18

  • SHA256

    7d84865d90b0ccbba155652276315f228b7fe09480d9a9ea4ad7b798170b3752

  • SHA512

    1d922db2ce32ef3c64d29d00e46240ea5ca8c692f5f0fd52b8e54378dff29b3fbbfcfd4a0d87d99eb0d46afd11615473c97c0af3dd233946c27514d92c40a898

  • SSDEEP

    1536:wUwC+xhUa9urgOBPRNvM4jEwzGi1dDHDggS:wUmUa9urgObdGi1dnJ

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

2.tcp.eu.ngrok.io:13536

Mutex

b8368678657c11d28fd06f42a3c32088

Attributes
  • reg_key

    b8368678657c11d28fd06f42a3c32088

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections